Skip to main content

Tailorable Representation of Security Control Catalog on Semantic Wiki

  • Chapter
  • First Online:
Cyber Security: Power and Technology

Abstract

Selection of security controls to be implemented is an essential part of the information security management process in an organization. There exist a number of readily available information security management system standards, including control catalogs, that could be tailored by the organizations to meet their security objectives. Still, it has been noted that many organizations tend to lack even the implementation of the fundamental security controls. At the same time, semantic wikis have become popular collaboration and information sharing platforms that have proven their strength as an effective way to distribute domain-specific information within an organization. This paper evaluates the adequacy of the semantic wiki as a security control catalog platform for building an information security knowledge base that would especially help small and medium-sized enterprises to develop and maintain their security baseline.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://nvd.nist.gov/static/feeds/xml/sp80053/rev4/800-53-controls.xml

References

  • Barlette Y, Fomin VV (2008) Exploring the suitability of IS security management standards for SMEs. In Proceedings of the 41st annual Hawaii international conference on system sciences, pp 308–308

    Google Scholar 

  • BSI (2013) IT-Grundschutz Catalogues. German Federal Office for Information Security (BSI)

    Google Scholar 

  • Elkaffas SM, Wagih AS (2013) Use of semantic wiki as a capturing tool for lessons learned in project management. In Proceedings of the science and information conference (SAI), pp 727–731

    Google Scholar 

  • Fenz S, Heurix J, Neubauer T et al (2014) Current challenges in information security risk management. Inf Manag Comput Secur 22(5):410–430. https://doi.org/10.1108/IMCS-07-2013-0053

    Article  Google Scholar 

  • García R, Gil R, Gimeno JM et al (2010) Semantic wiki for quality management in software development projects. Iet Softw 4(6):386–395

    Article  Google Scholar 

  • Geisser M, Happel H, Hildenbrand T et al (2008) New applications for Wikis in software engineering. In: PRIMIUM

    Google Scholar 

  • Gruber T (2009) Ontology. Encyclopedia of database systems. Springer, New York, pp 1963–1965

    Google Scholar 

  • ISO/IEC 27001:2013 (2013) Information technology—Security techniques—Information security management systems—Requirements. ISO copyright office. Geneva, Switzerland

    Google Scholar 

  • ISO/IEC 27002:2013 (2013) Information technology—Security techniques—Information security management systems—Code of practice for information security management. ISO/IEC

    Google Scholar 

  • Khanom S, Heimbürger A, Kärkkäinen T (2015) Can icons enhance requirements engineering work? J Vis Languages Comput 28:147–162. https://doi.org/10.1016/j.jvlc.2014.12.011

    Article  Google Scholar 

  • Kleiner F, Abecker A, Brinkmann SF (2009) WiSyMon: managing systems monitoring information in semantic Wikis. In Proceedings of third international conference on advances in semantic processing, SEMAPRO’09, pp 77–85

    Google Scholar 

  • Lahoud I, Monticolo D, Hilaire V (2014) A semantic Wiki to share and reuse knowledge into extended enterprise. In Proceedings of tenth international IEEE conference on signal-image technology and internet-based systems (SITIS), pp 702–708

    Google Scholar 

  • Lyubimov A, Cheremushkin D, Andreeva N et al (2011) Information security integral engineering technique and its application in ISMS design. In Proceedings of sixth international conference on availability, reliability and security (ARES), pp 585–590

    Google Scholar 

  • Neubauer T, Ekelhart A, Fenz S (2008) Interactive Selection of ISO 27001 controls under multiple objectives. In: Jajodia S, Samarati P, Cimato S (eds) Proceedings of the Ifip Tc 11 23rd international information security conference, vol 278. Springer, New York, pp 477–492

    Google Scholar 

  • NIST Special Publication 800–39 (2011) Managing Information Security Risk: Organization, Mission, and Information System View

    Google Scholar 

  • NIST Special Publication 800-53 Revision 4 (2013) Security and Privacy Controls for Federal Information Systems and Organizations

    Google Scholar 

  • Ross R (2007) Managing enterprise security risk with NIST standards. Computer 40(8):88–91. https://doi.org/10.1109/MC.2007.284

    Article  Google Scholar 

  • Yeniman Yildirim E, Akalp G, Aytac S et al (2011) Factors influencing information security management in small—and medium-sized enterprises: a case study from Turkey. Int J Inf Manage 31(4):360–365. https://doi.org/10.1016/j.ijinfomgt.2010.10.006

    Article  Google Scholar 

  • Yao Y, Ma X, Liu H et al (2014) A semantic knowledge base construction method for information security. In Proceedings of the IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), pp 803–808

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Riku Nykänen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nykänen, R., Kärkkäinen, T. (2018). Tailorable Representation of Security Control Catalog on Semantic Wiki. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75307-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75306-5

  • Online ISBN: 978-3-319-75307-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics